skip to content
Security for wireless sensor networks using identity-based cryptography Preview this item
ClosePreview this item
Checking...

Security for wireless sensor networks using identity-based cryptography

Author: Harsh Kupwade Patil; Stephen A Szygenda
Publisher: Boca Raton, FL : CRC Press, ©2013.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Security for Wireless Sensor Networks Using Identity-based Cryptography.
Auerbach Pub 2012
(OCoLC)690089875
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Harsh Kupwade Patil; Stephen A Szygenda
ISBN: 9781439869024 1439869022
OCLC Number: 815659938
Description: 1 online resource (xix, 204 pages)
Contents: Ch. 1. Introduction to wireless sensor networks --
ch. 2. Security in wireless sensor networks --
ch. 3. Elliptic curve cryptography --
ch. 4. Identity-based cryptography --
ch. 5. Identity-based authentication and encryption in wireless sensor networks --
ch. 6. Identity-based key distribution in wireless sensor networks --
ch. 7. Routing in wireless sensor networks using identity-based cryptography --
ch. 8. Cross-layer security in wireless sensor networks --
ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks.
Responsibility: Harsh Kupwade Patil, Stephen A. Szygenda.

Reviews

Editorial reviews

Publisher Synopsis

" ... an excellent starting point for practitioners in the industry and students in academia faced with security issues in WSNs. It provides a comprehensive and systematic introduction to the Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/815659938> # Security for wireless sensor networks using identity-based cryptography
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "815659938" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1176238005#Place/boca_raton_fl> ; # Boca Raton, FL
    schema:about <http://experiment.worldcat.org/entity/work/data/1176238005#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1176238005#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1176238005#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://id.loc.gov/authorities/subjects/sh85029553> ; # Computers--Access control
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:about <http://id.worldcat.org/fast/1082562> ; # Public key cryptography
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/288216870> ; # Stephen A. Szygenda
    schema:copyrightYear "2013" ;
    schema:creator <http://viaf.org/viaf/280709985> ; # Harsh Kupwade Patil
    schema:datePublished "2012" ;
    schema:description "Ch. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1176238005> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/690089875> ;
    schema:name "Security for wireless sensor networks using identity-based cryptography"@en ;
    schema:productID "815659938" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/815659938#PublicationEvent/boca_raton_fl_crc_press_2013> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1176238005#Agent/crc_press> ; # CRC Press
    schema:url <http://www.crcnetbase.com/isbn/9781439869024> ;
    schema:url <http://site.ebrary.com/id/10611470> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1044858> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=47270> ;
    schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=4010334> ;
    schema:url <http://www.crcnetbase.com/isbn/9781439869017> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=490721> ;
    schema:workExample <http://worldcat.org/isbn/9781439869024> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/815659938> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1176238005#Place/boca_raton_fl> # Boca Raton, FL
    a schema:Place ;
    schema:name "Boca Raton, FL" ;
    .

<http://experiment.worldcat.org/entity/work/data/1176238005#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1176238005#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1176238005#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029553> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://id.worldcat.org/fast/1082562> # Public key cryptography
    a schema:Intangible ;
    schema:name "Public key cryptography"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://viaf.org/viaf/280709985> # Harsh Kupwade Patil
    a schema:Person ;
    schema:familyName "Patil" ;
    schema:givenName "Harsh Kupwade" ;
    schema:name "Harsh Kupwade Patil" ;
    .

<http://viaf.org/viaf/288216870> # Stephen A. Szygenda
    a schema:Person ;
    schema:familyName "Szygenda" ;
    schema:givenName "Stephen A." ;
    schema:name "Stephen A. Szygenda" ;
    .

<http://worldcat.org/isbn/9781439869024>
    a schema:ProductModel ;
    schema:isbn "1439869022" ;
    schema:isbn "9781439869024" ;
    .

<http://www.worldcat.org/oclc/690089875>
    a schema:CreativeWork ;
    rdfs:label "Security for Wireless Sensor Networks Using Identity-based Cryptography." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/815659938> ; # Security for wireless sensor networks using identity-based cryptography
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.